ADAPTIVE ORDERED WEIGHTED AVERAGING FOR ANOMALY DETECTION IN CLUSTER-BASED MOBILE AD HOC NETWORKS

Document Type: Research Paper

Authors

Department of Electrical and Computer Engineering, Tarbiat Modares University, Tehran, Islamic Republic of Iran

Abstract

In this paper, an anomaly detection method in cluster-based mobile ad hoc networks with ad hoc on demand distance vector (AODV) routing protocol is proposed. In the method, the required features for describing the normal behavior of AODV are defined via step by step analysis of AODV and independent of any attack. In order to learn the normal behavior of AODV, a fuzzy averaging method is used for combining one-class support vector machine (OCSVM), mixture of Gaussians (MoG), and self-organizing maps (SOM) one-class classifiers and the combined model is utilized to partially detect the attacks in cluster members. The votes of cluster members are periodically transmitted to the cluster head and final decision on attack detection is carried out in the cluster head. In the proposed method, an adaptive ordered weighted averaging (OWA) operator is used for aggregating the votes of cluster members in the cluster head. Since the network topology, traffic, and environmental conditions of a MANET as well as the number of nodes in each cluster dynamically change, the mere use of a fixed quantifier-based weight generation approach for OWA operator is not efficient. We propose a condition-based weight generation method for OWA operator in which the number of cluster members that participate in decision making may be varying in time and OWA weights are calculated periodically and dynamically based on the conditions of the network. Simulation results demonstrate the effectiveness of the proposed method in detecting  rushing, RouteError fabrication, and wormhole attacks.

Keywords


[1] B. S. Ahn, Preference relation approach for obtaining OWA operators weights, International
Journal of Approximate Reasoning, 47 (2008), 166-178.
[2] B. S. Ahn, Parameterized OWA operator weights: an extreme point approach, International
Journal of Approximate Reasoning, 51 (2010), 820-831.
[3] G. R. Amin and A. Emrouznejad, An extended minimax disparity to determine the OWA
operator weights, Computers & Industrial Engineering, 50 (2006), 312-316.
[4] V. S. Anitha and M. P. Sebastian, (k, r)-dominating set-based, weighted and adaptive cluster-
ing algorithms for mobile ad hoc networks, IET Communications, 5(13) (2011), 1836-1853.
[5] T. Avram, S. Oh and S. Hariri, Analyzing attacks in wireless ad hoc network with self-
organizing maps, in Proceedings of Fifth Annual Conference on Communication Networks
and Services Research (CNSR 07), (2007), 166-175.
[6] N. Y. Aydin, E. Kentel and S. Duzgun, GIS-based environmental assessment of wind energy
systems for spatial planning: a case study from Western Turkey, Renewable and Sustainable
Energy Reviews, 14 (2010), 364-373.
[7] K. Bhargavan, C. A. Gunter, M. Kim, I. Lee, D. Obradovic, O. Sokolsky and M. Viswanathan,
Verisim: formal analysis of network simulations, IEEE Transactions on Software Engineer-
ing, 28(2) (2002), 129-145.
[8] C. Bishop, Neural networks for pattern recognition, Oxford University Press, 1995.
[9] A. P. Bradley, The use of the area under the ROC curve in the evaluation of machine learning
algorithms, Pattern Recognition, 30(7) (1997), 1145-1159.
[10] J. B. D. Cabrera, C. Gutierrez and R. K. Mehra, Infrastructures and algorithms for dis-
tributed anomaly-based intrusion detection in mobile ad hoc networks, In Proceedings of
IEEE Military Communications Conference (MILCOM 2005), (2005), 1831-1837.

[11] J. B. D. Cabrera, C. Gutierrez and R. K. Mehra, Ensemble methods for anomaly detection
and distributed intrusion detection in mobile ad hoc networks, Information Fusion, 17(8)
(2008), 96-119.
[12] N. Cagman and S. Enginoglu, Fuzzy soft matrix theory and its application in decision making,
Iranian Journal of Fuzzy Systems, 9(1) (2012), 109-119.
[13] Z. Chen, Consensus in group decision making under linguistic assessments, Ph.D. Disserta-
tion, Kansas State University, 2005.
[14] W. Chen, N. Jain and S. Singh, ANMP: ad hoc network management protocol, IEEE Journal
on Selected Areas in Communications, 17(8) (1999), 1506-1531.
[15] H. Chen and L. Zhou, An approach to group decision making with interval fuzzy prefer-
ence relations based on induced generalized continuous ordered weighted averaging operator,
Expert Systems with Applications, 38 (2011), 13432-13440.
[16] S. Cho, Fuzzy aggregation of modular neural networks with ordered weighted averaging oper-
ators, International Journal of Approximate Reasoning, 13 (1995), 359-375.
[17] A. De and E. D. Diaz, A fuzzy ordered weighted average (OWA) approach to result merging
for meta search using the analytical network process, In Proceedings of Second International
Conference on Emerging Applications of Information Technology (EAIT), (2011), 17-20.
[18] H. Deng, R. Xu, J. Li, F. Zhang, R. Levy and W. Lee, Agent-based cooperative anomaly
detection for wireless ad hoc networks, In Proceedings of the 12th International Conference
on Parallel and Distributed Systems (ICPADS 06), 2006.
[19] H. Deng, Q. A. Zeng and D. P. Agrawal, SVM-based intrusion detection system for wireless ad
hoc networks, In Proceedings of IEEE Vehicular Technology Conference, (2003), 2147-2151.
[20] M. Dursun, E. E. Karsak and M. A. Karadayi, A fuzzy multi-criteria group decision mak-
ing framework for evaluating health-care waste disposal alternatives, Expert Systems with
Applications, 38 (2011), 11453-11462.
[21] A. Emrouznejad, MP-OWA: the most preferred OWA operator, Knowledge-Based Systems,
21 (2008), 847-851.
[22] A. Emrouznejad and G. R. Amin, Improving minimax disparity model to determine the OWA
operator weights, Information Sciences, 180 (2010), 1477-1485.
[23] D. Filev and R. R. Yager, On the issue of obtaining OWA operator weights, Fuzzy Sets and
Systems, 94 (1998), 157-169.
[24] R. Fuller and P. Majlender, An analytic approach for obtaining maximal entropy OWA op-
erator weights, Fuzzy Sets and Systems, 124 (2001), 53-57.
[25] R. Fuller and P. Majlender, On obtaining minimal variability OWA operator weights, Fuzzy
Sets and Systems, 136 (2003), 203-215.
[26] M. A. Ghaderi, N. Yazdani, B. Moshiri and M. Tayefeh Mahmoudi, A new approach for text
feature selection based on OWA operator, In Proceedings of 5th International Symposium on
Telecommunications (IST), (2010), 579-583.
[27] G. Giacinto, R. Perdisci, M. Del Rio and F. Roli, Intrusion detection in computer networks by
a modular ensemble of one-class classi ers, Information Fusion, Special Issue on Applications
of Ensemble Methods, 9(1) (2008), 69-82.
[28] F. Herrera, E. Herrera-Viedma and J. L. Verdegay, Direct approach processes in group deci-
sion making using linguistic OWA operators, Fuzzy Sets and Systems, 79 (1996), 175-190.
[29] Y. C. Hu, A. Perrig and D. B. Johnson, Rushing attacks and defense in wireless ad hoc
network routing protocols, in Proceedings of ACM Workshop on Wireless Security (WiSe
2003), (2003), 30-40.
[30] Y. C. Hu, A. Perrig and D. B. Johnson, Wormhole attacks in wireless networks, IEEE Journal
on Selected Areas in Communications, 24(2) (2006), 370-380.
[31] Y. Huang, W. Fan, W. Lee and P. Yu, Cross-feature analysis for detecting ad hoc routing
anomalies, in Proceedings of the 23rd International Conference on Distributed Computing
Systems (ICDCS 03), (2003), 478-487.
[32] Y. A. Huang and W. Lee, Attack analysis and detection for ad hoc routing protocols, in
Proceedings of Recent Advances in Intrusion Detection, (2004), 125-145.

[33] S. Jazebi, A. Tohidi and M. Rahgozar, Application of classi er fusion for protein fold recog-
nition, In Proceedings of Sixth International Conference on Fuzzy Systems and Knowledge
Discovery (FSKD 09), (2009), 171-175.
[34] T. Kohonen, self-organizing maps, Springer-Verlag, 3rd edition, 2001.
[35] L. I. Kuncheva, Combining pattern classi ers, methods and algorithms, John Wiley and Sons,
2004.
[36] S. Kurosawa, H. Nakayama, N. Kato, A. Jamalipour and Y. Nemoto, A self-adaptive in-
trusion detection method for AODV-based mobile ad hoc networks, In Proceedings of IEEE
International Conference on Mobile Ad hoc and Sensor Systems (IEEE MASS 05), (2005),
773-780.
[37] X. Li, F. Zhou and X. Yang, A multi-dimensional trust evaluation model for large-scale P2P
computing, Journal of Parallel and Distributed Computing, 71 (2011), 837-847.
[38] C. X. Ling, J. Huang and H. Zhang, AUC: a statistically consistent and more discriminat-
ing measure than accuracy, In Proceedings of 18th International Conference on Arti cial
Intelligence, (2003), 329-341.
[39] X. Liu, The solution equivalence of minimax disparity and minimum variance problems for
OWA operator, International Journal of Approximate Reasoning, 45 (2007), 68-81.
[40] X. Liu, A general model of parameterized OWA aggregation with given orness level, Interna-
tional Journal of Approximate Reasoning, 48 (2008), 598-627.
[41] B. Llamazares, Choosing OWA operator weights in the eld of social choice, Information
Sciences, 177 (2007), 4745-4756.
[42] C. Lo and W. Chen, A hybrid information security risk assessment procedure considering
interdependences between controls, Expert Systems with Applications, 39 (2012), 247-257.
[43] P. Majlender, OWA operators with maximal Renyi entropy, Fuzzy Sets and Systems, 155
(2005), 340-360.
[44] J. McElroy and P. Gader, Generalized encoding and decoding operators for lattice-based as-
sociative memories, IEEE Transactions on Neural Networks, 20(10) (2009), 1674-1678.
[45] J. M. Merigo and M. Casanovas, Fuzzy generalized hybrid aggregation operators and its
application in decision making, International Journal of Fuzzy Systems, 12(1) (2010), 15-24.
[46] J. M. Merigo and M. Casanovas, Decision-making with distance measures and induced ag-
gregation operators, Computers & Industrial Engineering, 60 (2011), 66-76.
[47] J. M. Merigo and M. Casanovas, Induced aggregation operators in the Euclidean distance and
its application in nancial decision making, Expert Systems with Applications, 38 (2011),
7603-7608.
[48] J. M. Merigo and M. Casanovas, Induced and uncertain heavy OWA operators, Computers
& Industrial Engineering, 60 (2011), 106-116.
[49] J. M. Merigo and A. M. Gil-Lafuente, The induced generalized OWA operator, Information
Sciences, 179(6) (2009),729-741.
[50] J. M. Merigo and A. M. Gil-Lafuente, Fuzzy induced generalized aggregation operators and its
application in multi-person decision making, Expert Systems with Applications, 38 (2011),
9761-9772.
[51] H. Nakayama, S. Kurosawa, A. Jamalipour, Y. Nemoto and N. Kato, A dynamic anomaly
detection scheme for AODV-based mobile ad hoc networks, IEEE Transactions on Vehicular
Technology, 58(5) (2009), 2471-2481.
[52] J. Nin, B. Carminati, E. Ferrari and V. Torra, Computing reputation for collaborative pri-
vate networks, in Proceedings of 33rd Annual IEEE International Computer Software and
Applications Conference (COMPSAC 09), (2009), 246-253.
[53] NS-2 (network simulator version 2), URL: http://www.isi.edu/nsnam/ns/ns-documentation,
2010.
[54] M. O'Hagan, Aggregating template or rule antecedents in real-time expert systems with fuzzy
set logic, In Proceedings of 22nd Annual IEEE Asilomar Conference on Signals, Systems,
Computers, (1988), 681-689.

[55] R. Perdisci, D. Ariu, P. Fogla, G. Giacinto and W. Lee, McPAD : a multiple classi er system
for accurate payload-based anomaly detection, Computer Networks, Special Issue on Trac
Classi cation and Its Applications to Modern Networks, 5(6) (2009), 864-881.
[56] C. Perkins and E. Royer, Ad hoc on demand distance vector routing, In Proceedings of
the Second IEEE Workshop on Mobile Computing Systems and Applications (WMCSA 99),
(1999), 90-100.
[57] C. Perkins, E. Royer and S. Das, Ad hoc on demand distance vector routing, IETF RFC
3561, 2003.
[58] J. Renaud, E. Levrat and C. Fonteix, Weights determination of OWA operators by parametric
identi cation, Mathematics and Computers in Simulation, 77 (2008), 499-511.
[59] R. Sadiq and S. Tesfamariam, Probability density functions-based weights for ordered weighted
averaging (OWA) operators: an example of water quality indices, European Journal of Op-
erational Research, 182 (2007), 1350-1368.
[60] B. Scholkopf, J. C. Platt, J. S. Taylor, A. J. Smola and R. C. Williamson, Estimating the
support of a high dimensional distribution, Neural Computation, 13 (2001), 1443-1471.
[61] F. Szidarovszky and M. Zarghami, Combining fuzzy quanti ers and neat operators for soft
computing, Iranian Journal of Fuzzy Systems, 6(1) (2009), 15-25.
[62] D. M. J. Tax, One-class classi cation, Ph.D. Dissertation, Delft University of Technology,
2001.
[63] D. M. J. Tax, M. V. Breukelen, R. P. W. D. Duin and J. Kittler, Combining multiple classi ers
by averaging or by multiplying?, Pattern Recognition, 33(9) (2000), 1475-1485.
[64] J. A. Torkestani and M. R. Meybodi, Clustering the wireless ad hoc networks: a distributed
learning automata approach, Journal of Parallel and Distributed Computing, 70(4) (2010),
394-405.
[65] Y. M. Wang, Y. Luo and X. Liu, Two new models for determining OWA operator weights,
Computers & Industrial Engineering, 52 (2007), 203-209.
[66] Y. M. Wang and C. Parkan, A minimax disparity approach for obtaining OWA operator
weights, Information Sciences, 175 (2005), 20-29.
[67] Y. M. Wang and C. Parkan, A preemptive goal programming method for aggregating OWA
operator weights in group decision making, Information Sciences, 177 (2007), 1867-1877.
[68] Y. Wu and J. Liu, A new method for sh disease diagnosis system based on rough set and
classi er fusion, In Proceedings of International Conference on Arti cial Intelligence and
Computational Intelligence (AICI 09), (2009), 24-27.
[69] J. Wu, B. L. Sun, C. Y. Liang and S. L. Yang, A linear programming model for determining
ordered weighted averaging operator weights with maximal Yager's entropy, Computers &
Industrial Engineering, 57 (2009), 742-747.
[70] Y. Wu, X. Tan and S. Gu, A learning evaluation system based on classi er fusion for E-
learning, In Proceedings of IEEE International Symposium on IT in Medicine & Education
(ITIME 09), (2009), 749-752.
[71] Z. Xu, Induced uncertain linguistic OWA operators applied to group decision making, Infor-
mation Fusion, 7 (2006), 231-238.
[72] R. R. Yager, On ordered weighted averaging aggregation operators in multi-criteria decision
making, IEEE Transactions on Systems, Man and Cybernetics, 18 (1988), 183-190.
[73] R. R. Yager, Families of OWA operators, Fuzzy Sets and Systems, 59 (1993), 125-148.
[74] R. R. Yager, Quanti er guided aggregation using OWA operators, International Journal of
Intelligent Systems, 11 (1996), 49-73.
[75] R. R. Yager, Heavy OWA operators, Fuzzy Optimization and Decision Making, 1(4) (2002),
379-397.
[76] R. R. Yager, Generalized OWA aggregation operators, Fuzzy Optimization and Decision Mak-
ing, 3(1) (2004), 93-107.
[77] R. R. Yager, OWA aggregation over a continuous interval argument with applications to
decision making, IEEE Transactions on Systems, Man, and Cybernetics, Part B 34 (2004),
1952-1963.
[78] R. R. Yager, Centered OWA operators, Soft Computing, 11 (2007), 631-639.

[79] R. R. Yager, On the dispersion measure of OWA operators, Information Sciences, 179 (2009),
3908-3919.
[80] R. R. Yager and D. P. Filev, Induced ordered weighted averaging operators, IEEE Transaction
on Systems, Man and Cybernetics, 29 (1999), 141-150.
[81] J. Y. Yu and P. H. J. Chong, A survey of clustering schemes for mobile ad hoc networks,
IEEE Communications Surveys & Tutorials, 7(1) (2005), 32-48.
[82] Y. Zhang and W. Lee, Intrusion detection in wireless ad hoc networks, In Proceedings of 6th
Annual International Conference on Mobile Computing and Networking, (2000), 275-283.
[83] Y. Zhang, W. Lee and Y. Huang, Intrusion detection techniques for mobile wireless networks,
ACM Wireless Networks, 9(5) (2003), 545-556.
[84] L. G. Zhou and H. Y. Chen, Continuous generalized OWA operator and its application to
decision making, Fuzzy Sets and Systems, 168 (2011), 18-34.
[85] S. M. Zhou, F. Chiclana, R. I. John and J. M. Garibaldi, Type-1 OWA operators for aggre-
gating uncertain information with uncertain weights induced by type-2 linguistic quanti ers,
Fuzzy Sets and Systems, 159 (2008), 3281-3296.
[86] S. M. Zhou, F. Chiclana, R. I. John and J. M. Garibaldi, Alpha-level aggregation: a practical
approach to type-1 OWA operation for aggregating uncertain information with applications
to breast cancer treatments, IEEE Transactions on Knowledge and Data Engineering, 23(10)
(2011), 1455-1468.